U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Case of Unmistaken Identity

NCJ Number
81701
Journal
Mitre Matrix Volume: 7 Issue: 5 Dated: (October 1974) Pages: 15-32
Author(s)
M Lynn
Date Published
1974
Length
18 pages
Annotation
The article describes two personnel identification systems developed by MITRE Corporation for a U.S. Air Force base and the U.S. Immigration and Naturalization Service that analyze handwriting, speech, and fingerprints to verify identify.
Abstract
A badge system for entry control works well in a relatively small installation with a fixed population, but is not suitable when a facility gets very large and has a fluid work force. To improve security at strategic air carrier bases, the U.S. Air Force worked with MITRE to develop the Code and Visual Entry Authorization Technique (CAVEAT) which stores a person's image along with other data and a code number on a video disk. At the entry point, an individual enters his code number, and if it is valid, the appropriate video image appears on the guard's monitor for comparison. Advanced models which could fully automate the entry control process are also being tested, including a voice system which analyzes the spectral peaks on the sound spectrum when an entrant speaks designated phrases containing all 12 vowel sounds. Also being developed are fingerprint verification and handwriting analysis capabilities based on the dynamics of pen movement and variations in pen pressure. MITRE is working on a civilian application of these techniques to control entry into the United States of nonimmigrant and resident aliens. This system uses a new border crossing card and new visas that contain personal data and physical characteristics about the alien which are encrypted to thwart alteration or counterfeiting. Border officials will use an automatic number reader to access data on the cards for interpretation by desktop minicomputers. A naked eye method of checking for impostors has been devised for officials without access to minicomputers which involves a grid system of numbers superimposed on the alien's photograph, a fingerprint, and a signature. Photographs are included.